lhhkujgnfb's Stars
jpillora/chisel
A fast TCP/UDP tunnel over HTTP
samratashok/nishang
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
michaelmsonne/ManagedIdentityPermissionManager
Azure Managed Identity Permissions Tool, a new PowerShell tool that simplifies and streamlines the management of Managed Identity permissions in Azure (Entra ID)
BushidoUK/Ransomware-Vulnerability-Matrix
A collection of CVEs weaponized by ransomware operators
openrelik/openrelik-deploy
Tools and scripts to deploy and manage OpenRelik instances
openrelik/openrelik.org
The source code for the OpenRelik public website
ropnop/kerbrute
A tool to perform Kerberos pre-auth bruteforcing
ZishanAdThandar/pentest
Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.
elastic/detection-rules
khyrenz/parseusbs
Parses USB connection artifacts from offline Registry hives
dafthack/MSOLSpray
A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the account, if a tenant doesn't exist, if a user doesn't exist, if the account is locked, or if the account is disabled.
Cloud-Architekt/AzureAD-Attack-Defense
This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and how they can be mitigated or detected.
tsale/EDR-Telemetry
This project aims to compare and evaluate the telemetry of various EDR products.
tsale/EDR-Telemetry-Website
SecurityAura/DE-TH-Aura
Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or even inspiration).
maaaaz/impacket-examples-windows
The great impacket example scripts compiled for Windows
tcostam/awesome-command-control
A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.
CyberSecurityUP/Red-Team-Management
fortra/impacket
Impacket is a collection of Python classes for working with network protocols.
DataDog/KubeHound
Tool for building Kubernetes attack paths
michenriksen/gitrob
Reconnaissance tool for GitHub organizations
PuravsPoint/DecipheringUAL
This repo aims to help you decipher the UAL from a Digital Forensics & Incident Response (DFIR) perspective. The UAL is the Microsoft 365 Unified Audit Log.
invictus-ir/o365_dataset
A dataset containing Office 365 Unified Audit Logs for security research and detection
blueteam0ps/det-eng-samples
This repository contains sample log data that were collected after running adversary simulations in Microsoft 365
philhagen/sof-elk
Configuration files for the SOF-ELK VM
PwC-IR/Business-Email-Compromise-Guide
The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Office 365 environment. Each step is intended to guide the process of identifying, collecting and analysing activity associated with BEC intrusions.
randomaccess3/Awesome-BEC
Repository of attack and defensive information for Business Email Compromise investigations
invictus-ir/Invictus-training
Repository with supporting materials for Invictus Academy/Training
aquasecurity/kube-hunter
Hunt for security weaknesses in Kubernetes clusters
blackhatethicalhacking/TerminatorZ
TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in your web applications.